1. Safety policies and procedures: Assess whether suppliers have clear safety policies and procedures, and check whether these policies and procedures conform to industry standards and best practices.
2. Safety training: Evaluate whether the supplier has provided necessary safety training for employees to ensure that they know how to protect company data and systems.
3. Data encryption: Evaluate whether the supplier uses appropriate encryption technology to protect sensitive data, such as the customer's credit card number or social security number.
4. Network security: Evaluate whether the supplier has appropriate network security measures, such as firewall, intrusion detection system and anti-virus software.
5. Access control: Evaluate whether the supplier has appropriate access control measures, such as password policy, multi-factor authentication and authority management.
6. Safety audit: Assess whether suppliers regularly conduct safety audits and check how they handle the problems found.